Sciweavers

1743 search results - page 233 / 349
» Design and Evaluation of a Knowledge Management System
Sort
View
FAST
2003
15 years 2 months ago
Block-Level Security for Network-Attached Disks
We propose a practical and efficient method for adding security to network-attached disks (NADs). In contrast to previous work, our design requires no changes to the data layout ...
Marcos Kawazoe Aguilera, Minwen Ji, Mark Lillibrid...
FC
2001
Springer
123views Cryptology» more  FC 2001»
15 years 6 months ago
Trust: A Collision of Paradigms
The technological challenges of securing networks are great, as recently witnessed in widespread denial of service and virus attacks. The human reaction to these attacks may be ei...
L. Jean Camp, Helen Nissenbaum, Cathleen McGrath
208
Voted
SIGMOD
2008
ACM
214views Database» more  SIGMOD 2008»
16 years 1 months ago
A graph method for keyword-based selection of the top-K databases
While database management systems offer a comprehensive solution to data storage, they require deep knowledge of the schema, as well as the data manipulation language, in order to...
Quang Hieu Vu, Beng Chin Ooi, Dimitris Papadias, A...
108
Voted
INFOCOM
2006
IEEE
15 years 7 months ago
Achieving Long-Term Surveillance in VigilNet
Abstract— Energy efficiency is a fundamental issue for outdoor sensor network systems. This paper presents the design and implementation of multi-dimensional power management st...
Tian He, Pascal Vicaire, Ting Yan, Qing Cao, Gang ...
STORAGESS
2005
ACM
15 years 7 months ago
An approach for fault tolerant and secure data storage in collaborative work environments
We describe a novel approach for building a secure and fault tolerant data storage service in collaborative work environments, which uses perfect secret sharing schemes to store d...
Arun Subbiah, Douglas M. Blough